General

  • Target

    85f05595c757c694136ceecaab4ef1a9_JaffaCakes118

  • Size

    142KB

  • Sample

    240531-esfl8sff89

  • MD5

    85f05595c757c694136ceecaab4ef1a9

  • SHA1

    decc013e8aed5b4d1bd93880862eac3f76b7be64

  • SHA256

    989453998eb96a29b42a09855a8733715faa3cf4e9110e7e0377a703763a0bf0

  • SHA512

    d59f987761dbf1fe2d248ecfb179a8df306c1508f7264df2713350405fb329da7bbd8ba42611f336c5cc3a2dc54e74d0b3eafa84d20cb5ad44c9302fd275c748

  • SSDEEP

    3072:UO8/FLfgW6rzTkYfiL2+jKfgi4m5nuGFU6W6WNE6b3U:A94zwFLnKP46uC

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      85f05595c757c694136ceecaab4ef1a9_JaffaCakes118

    • Size

      142KB

    • MD5

      85f05595c757c694136ceecaab4ef1a9

    • SHA1

      decc013e8aed5b4d1bd93880862eac3f76b7be64

    • SHA256

      989453998eb96a29b42a09855a8733715faa3cf4e9110e7e0377a703763a0bf0

    • SHA512

      d59f987761dbf1fe2d248ecfb179a8df306c1508f7264df2713350405fb329da7bbd8ba42611f336c5cc3a2dc54e74d0b3eafa84d20cb5ad44c9302fd275c748

    • SSDEEP

      3072:UO8/FLfgW6rzTkYfiL2+jKfgi4m5nuGFU6W6WNE6b3U:A94zwFLnKP46uC

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks